Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

JumpCloud

The IT Hour | JumpCloud Password Manager 3.0 08.16.24

JumpCloud Password Manager desktop app 3.0 has just released and there's a LOT to show you! Mathan Chakkravarthy & Firas Abou Karroum will be on the show to tell everyone much more. Join us at 11:30 am ET The #IT Hour hosted by #JumpCloud is a #communityprogram focused on the life of #ITAdministrators. With the ever changing #ITlandscape, having community and professional networking opportunities is very valuable.

The IT Hour | JumpCloud AI 08.09.24

It's time for an update on JumpCloud AI—Lindsey Thompson and Hugh Neale return to tell us what they've been working on and what's new in AI. Join us at 11:30 am ET The #IT Hour hosted by #JumpCloud is a #communityprogram focused on the life of #ITAdministrators. With the ever changing #ITlandscape, having community and professional networking opportunities is very valuable.

How To Manage Sudo Users in Other Distributions: Guides on Similar Procedures for Different Linux Distributions

Jump to Tutorial Managing sudo users is one of the most important administrative tasks in any Linux distribution. This process allows a permitted user to run commands as the superuser or another user, defined through security policies. This reduces the potential security threat of having unprivileged users run any command on the system, and we can also audit executed commands or apply the least privilege principle.
Featured Post

Why Shadow IT Prevails for UK SMEs

Fuelled by hybrid working models, easy access to cloud services, and the evolution of AI, shadow IT continues to be a pressing issue for UK organisations. Today, business users demand access anywhere at any time using multiple devices, while they expect their confidentiality, integrity and availability to be preserved as if they were in the office.

Ubuntu 20.04 vs 22.04: Comparing features and performance

Jump to Tutorial Ubuntu is a popular Linux distribution that has been adopted by many system administrators, developers, or everyday users who are searching for a robust and open-source operating system. Each version of Ubuntu brings new features, improvements and sometimes there are certain changes in system requirements.

Intune vs. JumpCloud for Discovering Shadow IT

People who don’t have the tool to get a job done will find one that works. That’s why shadow IT, software or services that are unaccounted for and unauthorized, exists. It may even underlie important business processes, which is why it’s extremely important to discover what’s really out there. Shadow IT creates security concerns, can impact operations, and easily becomes a roadblock on the path to digital transformation.

How AI Impacts Security at SMEs

For small and medium-sized enterprises (SMEs), staying abreast of cybersecurity developments is critical — not just to growth, but to the company’s bottom line. But security evolves quickly, and it can be hard to keep up. In the midst of this fast-evolving security environment, AI has made a bold entrance. So bold, in fact, that only 10% of SMEs aren’t using AI and don’t plan to, according to a recent JumpCloud research report.

MFA for MSPs: Benefits & Implementation of Multi-Tenant MFA

Multi-factor authentication (MFA) provides clear value to organizations pursuing cybersecurity initiatives. It provides effective identity security and dramatically reduces the risk associated with credential-based attacks and malicious insiders. However, implementing MFA consistently across the enterprise tech stack is not always easy. It’s an even bigger challenge for managed service providers (MSPs) who need to adopt different policies across a portfolio of client organizations under management.